Sciweavers

2434 search results - page 346 / 487
» Algorithmic Randomness of Closed Sets
Sort
View
PROVSEC
2010
Springer
15 years 1 months ago
Identity Based Public Verifiable Signcryption Scheme
Abstract. Signcryption as a single cryptographic primitive offers both confidentiality and authentication simultaneously. Generally in signcryption schemes, the message is hidden a...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
130
Voted
CORR
2011
Springer
186views Education» more  CORR 2011»
14 years 10 months ago
Similarity Join Size Estimation using Locality Sensitive Hashing
Similarity joins are important operations with a broad range of applications. In this paper, we study the problem of vector similarity join size estimation (VSJ). It is a generali...
Hongrae Lee, Raymond T. Ng, Kyuseok Shim
CISS
2008
IEEE
15 years 10 months ago
Relay selection methods for wireless cooperative communications
— We study the problem of relay selection in a wireless cooperative network. Assuming a single source, a single destination, and N uniformly distributed candidate relays, we seek...
Seunghoon Nam, Mai Vu, Vahid Tarokh
131
Voted
ATAL
2007
Springer
15 years 9 months ago
Subjective approximate solutions for decentralized POMDPs
A problem of planning for cooperative teams under uncertainty is a crucial one in multiagent systems. Decentralized partially observable Markov decision processes (DECPOMDPs) prov...
Anton Chechetka, Katia P. Sycara
127
Voted
ICMI
2005
Springer
193views Biometrics» more  ICMI 2005»
15 years 9 months ago
Augmenting conversational dialogue by means of latent semantic googling
This paper presents Latent Semantic Googling, a variant of Landauer’s Latent Semantic Indexing that uses the Google search engine to judge the semantic closeness of sets of word...
Robin Senior, Roel Vertegaal